Posts

Showing posts with the label Hacking Articles

Android Exploitation | Part - 3

Image
Bad week for Android. Just days after a critical  Stagefright vulnerability  was revealed in the widely popular mobile platform, another new vulnerability threatens to make most Android devices unresponsive and practically unusable to essential tasks. Security researchers at Trend Micro have developed an attack technique that could ultimately crash more than 55 percent of Android phones , almost making them completely unresponsive and useless to perform very basic functions, including to make or receive calls. The dangerous security flaw affects any device running  Android 4.3 Jelly Bean and later, including the latest Android 5.1.1 Lollipop , potentially putting hundreds of millions of Android users vulnerable to hackers. The flaw surfaced two days after Zimperium researchers warned that nearly  950 Million Android phones can be hijacked  by sending a simple text message. Dubbed  Stagefright , the vulnerability is more serious because...

How to Hack Android Phone | Part - 2

Image
Own an Android phone?  Beware, Your Android smartphones can be hacked by just a malformed text message. Security researchers have found that 95% of  Android  devices running version 2.2 to 5.1 of operating system, which includes Lollipop and KitKat, are vulnerable to a security bug, affecting more than 950 Million Android smartphones and tablets. Almost all Android smart devices available today are open to attack that could allow hackers to access the vulnerable device without the owners being aware of it, according to Joshua Drake, vice president of platform research and exploitation at security firm Zimperium. The vulnerability actually resides in a core Android component called " Stagefright ," a multimedia playback library used by Android to process, record and play multimedia files such as PDFs. A Text Message Received...Your Game is Over The sad news for most of the Android users is that the fix will not help Millions of Android users...

Smartwatch Owner | Have a Look

Image
Do you own a  Smartwatch ?  If yes, then how safe it is? There are almost 100 percent chances that you own a vulnerable Smartwatch. Computer manufacturer Hewlett-Packard is warning users of smartwatches including Apple Watch and Samsung Gear that their wearable devices are vulnerable to cyber attacks. In a study, HP's Fortify  tested today's top 10 smartwatches  for security features, such as basic data encryption, password protection and privacy concerns. Not even a Single Smartwatch Found to be 100 percent Safe Security experts found that 100 percent of wearable devices contained at least one serious security vulnerability that could make the devices vulnerable to hackers. With the increase in the adoption of smartwatches, manufacturers need to pay closer attention to the customers' security because these wearable devices could potentially open doors to new threats to personal and sensitive information. Here's the list of issues reporte...

New Android Hacking Tool

Image
Yes, this time researchers have found a source code to a new piece of weaponized android malware that had the capability to infect millions of Android devices even when users are running latest versions of the android mobile operating system. Trend Micro researchers  found  that the Italian spyware company was selling  RCSAndroid (Remote Control System Android) , which they says, is one of the  "most professionally developed and sophisticated"  pieces of Android malware a.k.a Android hacking tool they have ever seen. RCSAndroid is a sophisticated, real-world surveillance and hacking tool that provides even unskilled hackers to deploy one of the world's more advanced surveillance suites for Google's mobile operating system Android. List of Creepy Features of Android Hacking Tool Once installed on targets' devices, RCSAndroid would have helped government and law enforcement agencies around the world to completely compromise and monitor And...

ProxyHam | Hardware Proxy | Access Wi-fi from 2.5 miles away

Image
A method have been devised that not only allow users to anonymously connect to public Wi-Fi network, but also let them connect from about 2.5 Miles away . Security researcher Benjamin Caudill has developed a device that adds an extra layer of anonymity to whistleblowers, journalists, dissidents and, of course, criminals. How Proxyham is made? Proxyham is comprised of a WiFi-enabled Raspberry Pi computer , along with a three antennas setup. One antenna is used to connect to a source Wi-Fi network at a public place, and the other two antennas are used to transmit the Wi-Fi signal at a 900 MHz frequency. By relying on a 900 MegaHertz radio connection , ProxyHam effectively connects to a far-away Wi-Fi, with a range of between 1 and 2.5 Miles, depending upon certain interference factors. What ProxyHam do ? ProxyHam attempts to add an entirely new layer to attempts to anonymize - by removing the user from the IP address' location. Instead, the router broadcasts on a 900MHz ...

DeepWeb | Underground Market

Image
There is a "DeepWeb" which is totally different from the one we surf daily. 1. Also called the  hidden web  and  deepnet , the deep web is where search engines have not indexed he information, and so “invisible” to the mainstream public. 2. A 2001 study done at University of California, Berkeley estimated the deep web to consist of about 7.5 petabyes (or 7,500 gigabytes) of information. In a 2003 study, that number increased to 91,850 petabytes. Researchers also estimated that to the 1 billion indexed pages on the internet (in 2001), there were 550 billion in the deep web. 3. To access this part of the internet, you need to download The Onion Router, referred to as TOR. TOR is an anonymous network of nodes that are intended to mask the user’s IP and protect the privacy of the user. 4. You can read banned books on TOR. 5. Anonymous sellers advertise their goods on topic-specific forums. Like copied credit cards on a credit card fraud...

How to hide any file inside a picture | No Binder Needed.

Image
This tutorial can be used for any type of file including mp3,wmv,.rar,etc Here is how it goes: 1. Open C: Drive and make a folder in it e.g. “hacks”. Put both the files i.e. the file that you want to hide and the image inside which you want to hide the file into this folder 2. Select both the files and make a compressed RAR archive e.g. “secret.rar” out of them 3. Open Run and type in “cmd” to open the Command Prompt. Now type “cd..” and press enter and repeat this once again. Type “cd sizlopedia” to open the folder (where “hacks” is the folder that I am using in this tutorial) 4. Type the command “copy /b maria.jpg + secret.rar safe.jpg” and press enter 5. The new picture safe.jpg is now the nested Picture file which has the hidden file saved inside it. Change its extension from .jpg to .rar anytime to access or extract the hidden file Definitely cool and amazing trick. #nobindersneeded#hideyourfiles#winrar#secretfiles#hacking#hacktolearn

How to access Internet without any Browser ?

Image
Ever find yourself sitting in front of a computer where Internet Explorer or Firefox was blocked by IT Administrator, and restricted you from installing any software? If that PC is running Windows XP, then there is chance for you to still surf Internet. Just follow these simple steps: Open Calculator, Start> Program Files> Accessories> Calculator or press Windows+R and type ‘calc’ in the run box, click OK. In Calculator, go to Help> Help Topics. Right click on the left hand side of the title bar and click on ‘Jump to URL’. Type in the URL and make sure include the ‘http://’ at the beginning. For instance "http://www.google.com". #calculatoruseasbrowser#nobrowserneeded#enjoysurfing#windowsXP

How to hide your "secret folders" ?

Image
Guys, as you can guess with this trick you can make your folders invisible without using any sophisticated software. This is a very unusual & easy trick to make your private folders invisible to others. A folder contains two parts : an icon and a name . So to make the folder invisible you will have to make both the icon & the name invisible. Making The Name Invisible: Select the folder which you want to make invisible. Press F2 key then type ALT+0160 and hit enter key. You will notice that the name of the folder has become invisible. See the snapshot below. Making The Icon Invisible: Right click on the folder whose name you made invisible. Go to Properties, then go to the Customize tab. Then click on the Change Icon button. Select any blank icon there. Remember there will be many blank icons (see snapshot). Just choose any one. Click OK. Your folder is now invisible! Now only you know where the folder is located. #hidefolder#hideyoursecretstuff#...

Social Engineering

Image
We'll discuss about some real life scenarios and real life frauds (technical frauds) . There are situations which actually takes place with common man and how the crime/fraud takes place with them who have less/no knowledge regarding such cyber crimes/frauds. We live in a digital world  where we use  "E-mail"  rather than postcards/letters etc. Now , someday at sometime if you got a mail from your  "favourite celebrity", "favourite sportsperson" or "from a grl"  you always wanted to talk in college,  lottery winning mail , you would feel very pleased and blessed enough to receive that e-mail. RIGHT ?? But one second , do you really think that such personalities would have got time to mail you on the whole earth with a population of BILLIONS or such lotteries are being only made for you.. !! SO time for the truth ,  ACTUALLY   "you are being fooled  , by somewhat called "fake mailer" which are available for ...

Basic Tips To Prevent A DDoS Attack

Distributed denial-of-service (DDoS) attacks are always in top headlines worldwide, as they are plaguing websites in banks, and virtually of almost every organization having a prominent online  presence . The main cause behind the proliferation of DDoS attacks is that there  is a very low-cost that the attacker has to incur to put such attack  in motion . Fortunately, today various prevention methods have been developed to tackle such attacks. Before delving further into understanding about the ways to  prevent DDoS attack, let’s first understand what exactly a DDoS attack is! Understanding DDOS Attack A DDoS (distributed denial-of-service) attack is an attempt made by attackers to make computers’  resources  inaccessible to its anticipated user. In order to  carry out  a DDOS attack the attackers never uses their own system; rather they create  a network  of zombie computers often called as a “Botnet” – that is a hive of co...

Chinese Hackers Stole Blueprints of Israel's Iron Dome Missile Defense System

Image
Chinese hackers infiltrated the databases of three Israeli defense contractors and stole plans for Israel's Iron Dome missile defense system, according to an investigation by a Maryland-based cyber security firm ‘Cyber Engineering Services Inc. (CyberESI)’. Not just this, the hackers were also able to nab plans regarding other missile interceptors, including Unmanned Aerial Vehicles, ballistic rockets and the Arrow III missile interceptor which was designed by Boeing and other U.S.-based companies. The intrusions were thought to be executed by Beijing's infamous “Comment Crew” hacking group – a group of cyber warriors linked to the Chinese People’s Liberation Army (PLA) – into the corporate networks of top Israeli defense technology companies, including Elisra Group, Israel Aerospace Industries, and Rafael Advanced Defense Systems, between 10 October 2011 and 13 August 2012. The three Israeli defense technology companies were responsible for the development of the “Iro...

Syrian Hackers hacked TrueCaller

Image
Syrian hackers known for their hardcore support for President Bashar Ul Assad from  Syrian Electronic Army  are back in news, this time the army has claimed to have breached into the official website of Swedish based TrueCaller ( truecaller.com ), a global phone directory application for smartphones and feature phones, and accessible via a Web site. The claim was announced by the hackers on their official  website , saying that the databases contains hundred of millions of phone numbers and details of who owned these numbers, in addition of millions of Facebook, Twitter, Linkedin and Gmail accounts. Apart of that, the information has been dumped and sent to Syrian government. The list of the databases that been downloaded is mentioned below: truecaller_ugc: 459GB truecaller : 100GB truecaller_profiles : 4GB truecaller_api : 123KB truecaller_PushMe: 2.2KB tc_admin : 7MB tc_www: 70MB Syrian Electronic Army has released a screenshot o...

Anonymous hacks FEMA

Image
A group of  Anonymous  hacker has said to hack into a server used by Federal Emergency Management. According to them, the data secured through this breach is highly prolific and could beat the recent documents leaked by  Snowden   on  PRISM  project. In one of the documents published online the group unleashed the type of data they have gotten hold of. Most of it was email address and passwords of users which seem to government employees because most of the email addresses were hosted to .gov or .mil. The Anonymous group also disclosed the reasons behind this hack, according to them, they wanted disclose them as force especially in relation to crackdown attempts made against the hackers these days.Furthermore, they wanted government’s attention in regard to their intervention with the private sector for gathering sensitive information. One of Anonymous group’s member said: Anonymous does not wave the white flag. Not while we are faced with a d...